How a company-wide policy program could help the situation

Assignment Help Computer Network Security
Reference no: EM13649338

Peak View Sound Sources is a public company based in Denver, Colorado and is focused on providing digital media and Web sites to music companies and musicians through the Mountain and West Coast regions. The company has a solid reputation and is starting to get some national and worldwide attention, with new prospective companies wanting to take advantage of the quality services they have see on other existing Web sites.

Your company has been hired to assist Peak View Sound Sources (PVSS) to ascertain the security posture of the company's Information Systems resources and services. You are heading the team of auditors tasked to perform the audit and assessment.

You enter the company offices of PVSS and begin your analysis of the environment and situation.

Initial analysis has allowed you to determine that the company is made up of the following divisions:

• Corporate Management and Support Staff: This organization contains the executive management, human resources, and accounting teams. All company decisions are directed from the management team.

• Information Technology: This team manages the networks, servers, Web sites, and desktop environments for the company. The team has a perception of being difficult to work with, as they are slow to adopt new technology and slow to implement new offerings. The reality is that the team has resources and wants to uptake the newest and greatest technology, but they spend most of their time putting out fires and reacting to issues.

• Media Content and Design: This team is in charge of working with the record companies and musicians to create the Web Sites and implement the product offerings that are sold.

• Sales and Marketing: This team works with the musicians and record companies to offer and sell the services of PVSS.

There is a concern about the security of the infrastructure with respect to the ability to protect the copyrighted material that PVSS is given to host, because a single incident several years ago took place in which an entire new CD was released prematurely via the Internet. Although PVSS was not directly linked to the leak, there are suspicions surrounding PVSS.
Assignment Deliverables

As you continue your analysis, you see that the Information Technology (IT) department has developed several guidelines and procedures about how various systems should be considered and set up, but this is internal only to the IT department. Every time a new machine is set up and deployed, within a month, the configuration is changed.

• Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.

• As you begin to prepare your game plan to conduct an Information Security Audit, talk about why you think this current situation makes it difficult to identify the controls that need to be examined.

• If you were performing this security audit, with which regulations would you want to ensure that PVSS complies? Why?

Reference no: EM13649338

Questions Cloud

Determine velocity as function if time for raindrop of mass : Determine the velocity as a function if time for a raindrop of mass m = 4x10-6 kg that reaches a terminal velocity ofvt = 6m/s, for which the resistive force is given by f = bv where bis the proportionality constant. Evaluate the constant b
Describe what is the position of the image : An object is 7.94 cm from the surface of a reflective spherical Christmas-tree ornament 7.8 cm in diameter. What is the position of the image
What angle does the light leave the water : A diver shines a flashlight upward from beneath the water ata 38.0^\circ angle to the vertical. At what angle does the light leave the water?
What power does the engine develop : An engine moves a boat throughthe water at a constant speed of 15 m/s. What power does the engine develop
How a company-wide policy program could help the situation : Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.
What is the rotational inertia of wheel about rotation axis : A constant horizontal force F of magnitude 20 N is applied to awheel of mass 20 kg and radius 0.5 m. The wheel rolls withoutslipping on the horizontal surface, and the acceleration of its center of mass has magnitude 0.5 m/s^2.
Find what was the initial speed of the bullet : A 12 g bullet moving horizontally strikes and remains in a 3.0 kg block initially at rest on the edge of table. What was the initial speed of the bullet
Determine what is the high speed : A motor has a constant angular acceleration of 5rev/sec2. If the motor goes from low speed of 1200RPM tohigh speed in 5 seconds, what is the high speed
How much kinetic energy is lost in this collision : A 2.0 kg object moving with a velocity of 5.0 m/s in the positive x direction strikes and sticks to a 3.0 kg object moving with a speed of 2.0 m/s in the same direction. How much kinetic energy is lost in this collision

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  At what generation did video downloads and reasonably fast

answer the following test your understanding questions from chapter 8 using apa style and form nbspnbsp a. what are

  How to set up or improve their cybersecurity

How should government justify telling private industry how to set up or improve their cybersecurity?

  Importance of maintaining the secure computing environment

Prepare a report providing categorical feature comparison for the three products in the chosen category and make recommendations about the products to assist purchasing decision.

  What efforts must be made to help overcome these challenges

What do you believe to be the primary challenges that law enforcement agencies must face in investigating cyber exploitation and cyber crime? What efforts must be made to help overcome these challenges?

  Calculate the crc or fcs for the sender

The pattern or generator is P 1001. Calculate the CRC or FCS for the sender. You must give the details of this calculation.

  Describe why important to secure windows-unix from servers

Describe why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  How to demonstrate that the server is up and running

You have been asked to install an SVN repository on a server. The SVN will be remotely accessed using the svnserve daemon that is supplied with SVN (please note that this is not the most secure way to access an SVN repository)

  Experiences with the social networking sites

Your experiences with the social networking sites like Craig list etc etc and Why do you think social networking sites are so popular? In other words, what is their stickiness?

  Security risk to acknowledge using macros

Write down 200- to 300-word response which answers the following question: Based on article by Lenning (2005), what is main security risk which users must acknowledge when using macros?

  Organization-severely lacks in appreciating need security

Organization that severely lacks in appreciating the need for security or a company that depends on equipment that is outdated and services from contractors that are low quality? Why?

  To ensure the security of the files used by the new web site

To ensure the security of the files used by the new Web site, files need to access controls that limit which users can view and execute them. To further your understanding of file permissions, describe in detail these 5 file listings, explain a..

  Solve using javascript to implement rsa

ECB2234 Assignment- Use JavaScript to implement RSA including Key generation Encryption. Decryption. Signing. Verifying.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd